Skip to main content

Retriever for finding most relevant code

Project description

Code Retriever Logo

Install & Run

pip install coden-retriever

Requires Python 3.10-3.12. Python 3.13+ is not supported because tree-sitter-languages (required for multi-language parsing) only provides wheels up to Python 3.12.

Optional Extras

The core package provides BM25 keyword search, code mapping, hotspot detection, and propagation analysis. Advanced features require optional extras:

# Core only (BM25 search, code map, hotspots, propagation)
pip install coden-retriever

# Semantic search, clone detection, echo comment detection
pip install 'coden-retriever[semantic]'

# MCP server mode
pip install 'coden-retriever[mcp]'

# Interactive agent mode
pip install 'coden-retriever[agent]'

# All features
pip install 'coden-retriever[all]'

# Development (tests, linting)
pip install 'coden-retriever[dev]'
Feature Required Extra Command Example
BM25 keyword search Core coden /path -q "auth"
Code map & hotspots Core coden /path --map, coden /path -H
Propagation analysis Core coden /path -P
Dead code detection Core coden /path -D
Tramp data detection Core coden /path -T
Sensitive value detection Core coden /path -S
Semantic search [semantic] coden /path -q "auth" --semantic
Clone detection (semantic/combined) [semantic] coden /path -C
Echo comment detection [semantic] coden /path -E
MCP server [mcp] coden serve
Interactive agent [agent] coden --agent
# Get a ranked map of a repo
coden /path/to/repo

# Top 50 results with stats
coden /path/to/repo --stats -n 50 -r

# Search for something
coden /path/to/repo --query "authentication"

# Find a specific symbol
coden /path/to/repo --find "UserAuth"

# Find refactoring hotspots (high coupling + complexity)
coden /path/to/repo --hotspots -n 20 --stats -r

# Detect code clones (find duplicate/similar functions)
coden /path/to/repo --clones --clone-threshold 0.90

# Clone detection modes: semantic-only or syntactic-only
coden /path/to/repo --clones --clone-semantic     # Similar behavior (embeddings)
coden /path/to/repo --clones --clone-syntactic    # Copy-paste detection (Jaccard)

# Analyze architecture health (propagation cost)
coden /path/to/repo --propagation --breakdown

# Find echo comments (comments that just restate the code)
coden /path/to/repo flag -E --dry-run

# Detect dead code (unused functions with no callers)
coden /path/to/repo -D --dead-code-threshold 0.5

# Detect tramp data (parameters appearing in many functions)
coden /path/to/repo -T --min-occurrences 5

# Detect sensitive values (hardcoded secrets, API keys)
coden /path/to/repo -S --sensitive-threshold 0.5
Coden stats output showing directory tree and ranking metrics

The Problem

Codebases are not a flat collection of text files. It is extremely valueable to understand which files are key components and which ones are not. That is what this tool achieves: To help developers, as well as LLM's gain a strong mental model of the codebase.

Note: The first run of $ coden on a new codebase is slower because it parses everything and buils a call graph. Subsequent runs are cached.

How It Works

We initially parse code with tree-sitter, build a call graph (functions, classes, methods as nodes; calls, imports, inheritance as edges), and then run two graph algorithms to find what matters:

PageRank finds the load-bearing code. If a function is called by many other important functions, it scores high. High PageRank means "if this breaks, a lot of things break."

Betweenness Centrality finds the bridges--code that sits between different parts of your system. These are the integration points, the places where module A talks to module B. High betweenness means "this is where different parts of the system meet."

We use these instead of simple text matching because structural dependencies matter. A file that is imported everywhere is more important than a file that happens to contain your search term five times.

What You Are Looking At PageRank Betweenness Example
Core utility High Low Logger.log() - heavily used, does not connect modules
Integration point Medium High APIGateway.route() - bridges layers
Central hub High High Database.query() - important AND connects many parts

Results are ranked using Reciprocal Rank Fusion across:

  • BM25 - Keyword matching
  • Semantic similarity - Conceptually similar code (enable with --semantic)
  • PageRank - Structural importance
  • Betweenness - Bridge detection

Keyword vs Semantic Search

Mode When to Use
--query "auth" You know the terminology
--query "auth" --semantic You are asking a natural language question

Semantic search uses a Model2Vec model distilled from Qodo-Embed-1-1.5B that ships with the package.

Note: Semantic search requires the [semantic] extra: pip install 'coden-retriever[semantic]'

Supported Languages

Support: Python, Go, Rust, Java, C, C++, C#, Kotlin, Swift, Javascript/Typescript, PHP, Scala, Bash

CLI Reference

coden /path/to/repo                          # Ranked map
coden /path/to/repo --query "auth"           # Keyword search
coden /path/to/repo --query "auth" --semantic # Semantic search
coden /path/to/repo --find "UserAuth"        # Find symbol
coden /path/to/repo --hotspots -n 20         # Top 20 refactoring hotspots
coden /path/to/repo -H --stats -r            # Hotspots with stats, reversed
coden /path/to/repo -C --clone-threshold 0.90      # Find code clones (90% similarity)
coden /path/to/repo -C --clone-semantic            # Semantic-only clone detection
coden /path/to/repo -C --clone-syntactic           # Syntactic-only clone detection
coden /path/to/repo -C --semantic-weight 0.65      # Adjust combined score weights
coden /path/to/repo -P --breakdown           # Architecture health analysis
coden /path/to/repo -P --critical-paths      # Show high-impact code paths
coden /path/to/repo -D                       # Detect dead code (no callers)
coden /path/to/repo -D --dead-code-threshold 0.7  # Stricter detection
coden /path/to/repo -T                       # Detect tramp data (shared param groups)
coden /path/to/repo -T --min-occurrences 5   # Tramp data with custom threshold
coden /path/to/repo -S                       # Detect sensitive values (secrets, keys)
coden /path/to/repo -S --sensitive-threshold 0.7  # Stricter detection
coden /path/to/repo --map --show-deps        # Show callers/callees
coden /path/to/repo --format json            # Output as json/markdown/xml
coden serve                                  # Start MCP server
coden serve --transport http --port 8000     # MCP over HTTP
coden -E --remove-comments --dry-run         # Preview echo comment removal
coden -E --remove-comments --backup          # Remove echoes entirely (with backup)
coden flag -C --dry-run                      # Preview clone flags
coden flag -E --dry-run                      # Preview echo comment flagging
coden flag -E --echo-threshold 0.85          # Flag echo comments (default threshold)
coden flag -E --echo-threshold 0.95          # Stricter: only near-identical echoes
coden flag -E --remove-comments --backup     # Alternative: remove via flag subcommand
coden flag -E --include-tests                # Include test files in analysis
coden flag -D --dry-run                      # Preview dead code flagging
coden flag -D --remove-dead-code --backup    # Remove dead code functions (DESTRUCTIVE)
coden flag -S --dry-run                      # Preview sensitive value flags
coden flag -S --replace --backup             # Replace secrets with ***REDACTED***
coden flag -S --replace "HIDDEN" --backup    # Replace with custom placeholder
coden flag -HPCETS --backup                  # Flag all issues (hotspots, propagation, clones, echoes, tramp data, sensitive values)
coden flag clear                             # Remove all [CODEN] comments
coden reset                                  # Reset everything (destructive!)

Daemon Mode

If you are running repeated queries, the daemon keeps indices in memory so you do not pay startup costs every time.

coden daemon start                # Start background service
coden /path/to/repo -q "auth"     # Queries use daemon automatically
coden daemon status               # Check if running
coden daemon stop                 # Stop it
coden daemon restart              # Restart
coden daemon clear-cache          # Clear daemon cache

Code Flagging

Add [CODEN] comments to mark problematic code or remove echo comments/dead code directly:

coden -E --remove-comments --dry-run # Preview echo comment removal (direct)
coden -E --remove-comments --backup  # Remove echo comments directly
coden flag -C --dry-run              # Preview clone flags
coden flag -E --dry-run              # Preview echo comment flags
coden flag -D --dry-run              # Preview dead code flags
coden flag -T --dry-run              # Preview tramp data flags
coden flag -S --dry-run              # Preview sensitive value flags
coden flag -S --replace --backup     # Replace secrets with ***REDACTED***
coden flag -D --remove-dead-code --backup  # Remove dead code entirely (DESTRUCTIVE)
coden flag -HPCETS --backup          # Flag all analysis types
coden flag clear                     # Remove all [CODEN] comments

Common Options

  • --dry-run: Preview changes without modifying files. Always use this first to see what will be flagged.
  • --backup: Create .coden-backup copies of files before modification (e.g., file.py.coden-backup).
  • --include-tests: Include test files in analysis (excluded by default).
  • --stats: Display summary statistics after flagging.

Analysis Types & Thresholds

Analysis Type Flag Threshold Option Default Description
Hotspots -H --risk-threshold 50 Min risk score (raw score, typically 50-200+)
Propagation Cost -P --propagation-threshold 0.25 Min internal coupling for modules (0-1)
Code Clones -C --clone-threshold 0.95 Min semantic similarity for clones (0-1)
Echo Comments -E --echo-threshold 0.85 Min similarity for echo detection (0-1)
Dead Code -D --dead-code-threshold 0.50 Min confidence for dead code detection (0-1)
Tramp Data -T --min-occurrences 3 Min functions a param group must appear in (1+)
Sensitive Values -S --sensitive-threshold 0.35 Min confidence for secret detection (0-1)

Usage notes:

  • All threshold options work in both direct mode (coden -H) and flag mode (coden flag -H)
  • -H: Filters hotspots with risk_score >= threshold (raw score = coupling x log(complexity))
  • -P: Filters modules in breakdown with internal_coupling >= threshold (0-1 scale)
  • -C: Filters clones with similarity >= threshold (0-1 scale)
  • -E: Filters echo comments with similarity >= threshold (0-1 scale)
  • -D: Filters dead code with confidence >= threshold (0-1 scale)
  • -T: Filters tramp data with function_count >= threshold (1+ scale, integer)
  • -S: Filters sensitive values with confidence >= threshold (0-1 scale)

Threshold ranges: -P, -C, -E, -D, -S use 0-1 scale. Lower values are more recall (more results), higher values are more precision (fewer, higher-confidence results). -H uses raw risk scores (typically 50-200+).

Code Clone Detection

Note: Combined and semantic clone detection require the [semantic] extra: pip install 'coden-retriever[semantic]'. Syntactic-only mode (--clone-syntactic) works with the core package.

Clone detection finds duplicate or near-duplicate functions that are candidates for refactoring. Three detection modes are available:

Mode Flag Description Best For
Combined (default) Both semantic + syntactic General use, balanced detection
Semantic --clone-semantic Model2Vec embeddings Behaviorally similar functions
Syntactic --clone-syntactic Line-by-line Jaccard Exact copy-paste detection

Detection Modes Explained

Combined mode (default) uses a weighted harmonic mean of semantic and syntactic scores:

  • Semantic weight: 0.65 (adjustable via --semantic-weight)
  • Syntactic weight: 0.35 (adjustable via --syntactic-weight)

Semantic mode detects functions with similar behavior, even if structurally different. Uses Model2Vec embeddings to find:

  • Async/sync variants of the same function
  • Functions that do the same thing with different implementations
  • Renamed copies with modified variable names

Syntactic mode detects copy-paste clones using line-by-line Jaccard similarity:

  • --line-threshold: Min similarity per line (default: 0.70)
  • --func-threshold: Min percentage of lines that must match (default: 0.50)

Usage Examples

# Default combined mode (recommended)
coden /path/to/repo -C --clone-threshold 0.90

# Semantic-only: find behaviorally similar functions
coden /path/to/repo -C --clone-semantic

# Syntactic-only: find copy-paste duplicates
coden /path/to/repo -C --clone-syntactic

# Adjust combined weights (more emphasis on semantic similarity)
coden /path/to/repo -C --semantic-weight 0.80 --syntactic-weight 0.20

# Syntactic with custom thresholds
coden /path/to/repo -C --clone-syntactic --line-threshold 0.80 --func-threshold 0.60

# Flag clones in code with [CODEN] comments
coden flag -C --backup

Echo Comment Detection

Note: Echo comment detection requires the [semantic] extra: pip install 'coden-retriever[semantic]'

Echo comments are comments that provide no additional value because they simply repeat what the code identifier already conveys. For example:

Echo comments (redundant):

# Calculate the total
def calculate_total(items):
    return sum(item.price for item in items)

# Process the payment
def process_payment(amount):
    ...

Good comments (provide context):

# Apply progressive discount based on customer lifetime value
# Tier 1: 0-10 purchases = 0%, Tier 2: 11-50 = 5%, Tier 3: 51+ = 10%
def calculate_discount_tier(purchases: int) -> float:
    ...

Echo detection uses:

  • Tree-sitter AST parsing to extract ALL comments from your codebase
  • Semantic similarity analysis (Model2Vec embeddings + cosine similarity) to compare comment text with code identifiers
  • Configurable threshold to control strictness (0.95 = near-identical only, 0.75 = looser)

Usage Examples

# Preview echo comments (dry run)
coden flag -E --dry-run

# Flag echo comments with [CODEN] markers
coden flag -E --backup

# Remove echo comments entirely (no markers)
coden flag -E --remove-comments --backup

# Adjust threshold (stricter - only exact echoes)
coden flag -E --echo-threshold 0.95 --dry-run

# Adjust threshold (looser - catch more potential echoes)
coden flag -E --echo-threshold 0.75 --dry-run

# Include test files in analysis
coden flag -E --include-tests --dry-run

# Combine with other analysis types
coden flag -HPCETS --backup  # All analyses at once

# Preview only top 10 issues (limit only works in dry-run mode)
coden flag -H --dry-run -n 10

Options Explained

--dry-run: Preview mode - shows what would be changed without modifying any files. Use this first to review results before making changes.

-n/--limit: Limit the number of results (default: 20). Use -n -1 to show all results (may be slow for large repos). In flag mode, the limit only applies in dry-run preview - when actually flagging code (without --dry-run), all matching items will be flagged to ensure comprehensive coverage.

--backup: Creates a safety copy of each modified file with a .coden-backup extension before making changes. Recommended when removing comments or making bulk modifications. Example: modifying src/utils.py creates src/utils.py.coden-backup.

--remove-comments: Deletes detected echo comments entirely from the source files instead of flagging them with [CODEN] markers. Works with both coden -E --remove-comments and coden flag -E --remove-comments. Use with --backup for safety. Without this flag, echo comments are only flagged/displayed, not removed.

--include-tests: Include test files in the analysis (files matching *test*.py, *spec.ts, etc.). By default, test files are excluded since echo comments are more acceptable in tests where clarity is prioritized over conciseness.

--echo-threshold: Controls detection strictness (0.0-1.0 range):

  • 0.95 = Very strict, only near-identical echoes (e.g., # get user -> get_user())
  • 0.85 = Default, balanced detection
  • 0.75 = Looser, catches more potential echoes

Output Format

Flag mode displays a parameter header showing:

  • Active analysis types and their thresholds (e.g., "Hotspots (risk >= 50.0)")
  • Preview limit status (shows if -n is limiting results)
  • Warning message if -n is used without --dry-run

Detected echo comments show:

  • File path and line number
  • Similarity score (0-100%)
  • Severity: CRITICAL (>95%), HIGH (>90%), ELEVATED (>85%), MODERATE (<85%)
  • Comment text and associated code identifier

Dead Code Detection

Dead code detection finds functions with no callers in the codebase. Results are scored by confidence (0-1) based on whether the function is private, decorated, or follows entry-point patterns.

Usage Examples

# Basic detection (default 50% confidence threshold)
coden /path/to/repo -D

# Stricter (only high-confidence items)
coden /path/to/repo -D --dead-code-threshold 0.8

# Preview what would be flagged
coden flag -D --dry-run

# Flag with [CODEN] comments
coden flag -D --backup

# Remove dead code entirely (DESTRUCTIVE)
coden flag -D --remove-dead-code --backup

Options

  • --dead-code-threshold: Minimum confidence (0.0-1.0, default: 0.50)
  • --include-private: Include private functions (default: excluded)
  • --include-tests: Include test functions (default: excluded)
  • --remove-dead-code: Delete functions instead of flagging (use with --backup)

Automatically skipped: dunder methods (__init__), runtime-called functions (init(), constructor), test functions, and trivial functions (<3 lines).

Tramp Data Detection

Note: Tramp data detection is part of the core package (no extra required).

Tramp data detection identifies parameter groups that travel together across many functions, revealing a common anti-pattern where multiple related parameters are passed individually instead of being bundled into a configuration object.

For example, if you see (host, port, timeout) appearing together in 15 different functions, that's tramp data. The ideal refactor would be a ConnectionConfig object.

What Tramp Data Is

Anti-pattern (bad): Parameters scattered across many functions:

def connect(host, port, timeout):
    ...

def send_data(host, port, timeout, data):
    ...

def receive(host, port, timeout):
    ...

# (host, port, timeout) appears in 15 functions total!

Better: Grouped into a configuration object:

@dataclass
class ConnectionConfig:
    host: str
    port: int
    timeout: float

def connect(config: ConnectionConfig):
    ...

def send_data(config: ConnectionConfig, data):
    ...

def receive(config: ConnectionConfig):
    ...

Usage Examples

# Basic detection (default: groups appearing in 3+ functions)
coden /path/to/repo -T

# Stricter (only groups appearing in 5+ functions)
coden /path/to/repo -T --min-occurrences 5

# Require larger groups (minimum 3 parameters per group)
coden /path/to/repo -T --min-group-size 3

# Limit output to top 30 results
coden /path/to/repo -T -n 30

# Flag tramp data in code with [CODEN] comments
coden flag -T --dry-run
coden flag -T --backup

Algorithm

Tramp data detection uses:

  1. Frequent pair mining: Identify which parameter pairs occur together most often across functions
  2. Greedy group expansion: Merge pairs into larger groups based on co-occurrence patterns
  3. Scoring: Rank groups by group_size * function_count (larger groups appearing in more functions score higher)
  4. Subset suppression: Avoid duplicate reporting of parameter combinations

Options

  • --min-occurrences: Minimum function count for a parameter group (default: 3, range: 1+)
  • --min-group-size: Minimum parameters in a group (default: 2, range: 1+)
  • -n/--limit: Maximum results to display (default: 20, use -1 for all)

Output Format

Tramp data output shows:

  • Parameter Group: The co-occurring parameters (comma-separated, truncated if >4 params)
  • Functions: Count of functions containing this group
  • Severity: Color-coded by frequency (HIGH: 20+, MODERATE: 10-19, LOW: 5-9)
  • Sample Functions: Up to 3 example functions where the group appears

Sensitive Value Detection

Sensitive value detection finds hardcoded secrets, API keys, credentials, and other sensitive strings in your codebase using an ML classifier trained on entropy, character patterns, and known secret prefixes.

Usage Examples

# Basic detection (default 35% confidence threshold)
coden /path/to/repo -S

# Stricter (only high-confidence secrets)
coden /path/to/repo -S --sensitive-threshold 0.7

# Preview what would be flagged
coden flag -S --dry-run

# Flag with [CODEN] comments
coden flag -S --backup

# Replace secrets with ***REDACTED*** (or custom placeholder)
coden flag -S --replace --backup
coden flag -S --replace "HIDDEN" --backup

Options

  • --sensitive-threshold: Minimum confidence (0.0-1.0, default: 0.35). Lower = more recall, higher = more precision.
  • --replace: Replace detected secrets in source code. Without a value, uses ***REDACTED***. Accepts a custom placeholder.
  • --include-tests: Include test files in analysis (default: excluded).
  • -n/--limit: Maximum results to display (default: 20, use -1 for all).

Caching

Indices are cached in ~/.coden-retriever/.

coden cache list             # List cached projects
coden cache status           # Cache info for current directory
coden cache status /path     # Cache info for specific project
coden cache clear            # Clear cache for current directory
coden cache clear /path      # Clear cache for specific project
coden cache clear --all      # Clear everything
coden cache path             # Show cache directory

Configuration

Settings live in ~/.coden-retriever/settings.json.

coden config show        # Show all configuration
coden config path        # Show config file path
coden config reset       # Reset to defaults
coden config set <key> <value>  # Set a value

Configuration Structure

{
  "_version": 1,
  "model": {
    "default": "ollama:",
    "base_url": null,
    "provider_urls": {
      "ollama": "http://localhost:11434/v1",
      "llamacpp": "http://localhost:8080/v1"
    }
  },
  "agent": {
    "max_steps": 15,
    "max_retries": 5,
    "debug": false,
    "disabled_tools": ["debug_server"],
    "mcp_server_timeout": 30.0,
    "tool_instructions": false,
    "ask_tool_permission": true,
    "dynamic_tool_filtering": false,
    "tool_filter_threshold": 0.5
  },
  "daemon": {
    "host": "127.0.0.1",
    "port": 19847,
    "socket_timeout": 30.0,
    "max_projects": 5
  },
  "search": {
    "default_tokens": 4000,
    "default_limit": 20,
    "semantic_model_path": null
  }
}

Config Values

# Model
coden config set model.default ollama:qwen2.5-coder
coden config set model.base_url http://localhost:11434/v1

# Agent
coden config set agent.max_steps 20
coden config set agent.debug true

# Daemon
coden config set daemon.port 8080
coden config set daemon.max_projects 10

# Search
coden config set search.default_tokens 8000
coden config set search.default_limit 50

Environment Variables

These override the config file:

Variable What it does
CODEN_RETRIEVER_MODEL Override default model
CODEN_RETRIEVER_BASE_URL Override base URL
CODEN_RETRIEVER_DAEMON_PORT Override daemon port
CODEN_RETRIEVER_DAEMON_HOST Override daemon host
CODEN_RETRIEVER_MODEL_PATH Override semantic model path
CODEN_RETRIEVER_MCP_TIMEOUT Override MCP server timeout
CODEN_RETRIEVER_ENABLE_DYNAMIC_TOOLS Enable dynamic tools (1, true, yes)
CODEN_RETRIEVER_DISABLED_TOOLS Comma-separated tools to disable
CODEN_RETRIEVER_TEMPERATURE Override model temperature (0.0-2.0)
CODEN_RETRIEVER_MAX_TOKENS Override max response tokens
CODEN_RETRIEVER_TIMEOUT Override request timeout (seconds)

Interactive Agent

Note: Interactive agent requires the [agent] extra: pip install 'coden-retriever[agent]'

Coden agent mode welcome screen

Activate coden in agent mode and use an LLM to chat about your codebase.

coden -a                                           # Current directory
coden /path/to/repo --agent --model ollama:qwen2.5-coder  # With Ollama
coden /path/to/repo --agent --model llamacpp:      # With llama-cpp-server

Supported model formats:

Format Example What it connects to
ollama:model ollama:qwen2.5-coder:14b Ollama (localhost:11434)
llamacpp:model llamacpp:my-model llama-cpp-server (localhost:8080)
openai:model openai:gpt-4o OpenAI API (needs OPENAI_API_KEY)
model + --base-url my-model --base-url http://... Any OpenAI-compatible endpoint

For vLLM, LM Studio, etc:

coden -a --model my-model-name --base-url http://localhost:8000/v1

Type help in agent mode to see available tools, or menu/tools for the interactive tool picker.

Slash Commands

Command Aliases What it does
/help Show commands
/model [name] /m Show/switch model
/config View/modify settings
/tools /t Tool picker
/run /r, /execute Tool wizard
/study [topic] /learn, /quiz Quiz mode
/exit-study /stop-study Exit quiz
/debug [on|off] /d Toggle debug
/cd [path] /dir, /chdir Change directory
/clear /c Clear history
/exit /quit, /q Exit
/cache Cache management
/cache-clear /cc Clear current project cache
/cache-list /cl List cached projects

In-agent config:

/config                    # Show settings
/config set model ollama:codellama
/config set max_steps 20
/config reset

MCP Server

Note: MCP server mode requires the [mcp] extra: pip install 'coden-retriever[mcp]'

Transport options: stdio (default), http, sse, streamable-http

For VS Code, configure .vscode/mcp.json:

{
  "servers": {
    "coden": {
      "command": "${workspaceFolder}/.venv/Scripts/python.exe",
      "args": ["${workspaceFolder}/coden.py", "serve"]
    }
  }
}

Reload VS Code (Ctrl+Shift+P -> "Developer: Reload Window").

Tools

Code Discovery

  • code_map - Architectural overview with dependencies. Start here.
  • code_search - Keyword or semantic search.
  • coupling_hotspots - Find refactoring targets (high coupling + complexity). CLI: -H
  • find_hotspots - Git churn analysis (frequently changed files).
  • clone_detection - Find duplicate functions (combined/semantic/syntactic modes). CLI: -C
  • propagation_cost - Measure architecture health based on coupling. CLI: -P
  • detect_dead_code - Find unused functions with no callers. CLI: -D
  • detect_tramp_data - Identify parameter groups shared across many functions. CLI: -T
  • detect_sensitive_values - Find hardcoded secrets, API keys, and credentials. CLI: -S

Graph Analysis

  • change_impact_radius - Blast radius analysis ("if I change this, what breaks?").
  • architectural_bottlenecks - Find bridge functions with high betweenness centrality.

Symbol Lookup

  • find_identifier - Find exact symbol definitions.
  • trace_dependency_path - "If I change this, what breaks?"

Code Inspection

  • read_source_range - Read specific lines from a file.
  • read_source_ranges - Read multiple ranges at once.
  • git_history_context - Git blame info.
  • code_evolution - How code changed over time.

File Editing

  • write_file - Create or overwrite files.
  • edit_file - Surgical edits via SEARCH/REPLACE or AST-based SYMBOL targeting.
  • delete_file - Remove files.
  • undo_file_change - One-step undo per file.

Debugging

  • debug_stacktrace - Analyze Python stack traces.
  • debug_session - Manage DAP debug sessions.
  • debug_action - Step, continue, etc.
  • debug_state - Inspect variables, evaluate expressions.
  • add_breakpoint - Inject breakpoints into source.
  • inject_trace - Add trace/logging statements.
  • remove_injections - Clean up injected debug code.
  • list_injections - View active injections.

Python Environment

  • check_python_virtual_env - Detect venvs.
  • get_python_package_path - Locate installed packages.

Dynamic Tools (disabled by default)

  • create_dynamic_tool - Create custom MCP tools at runtime.
  • remove_dynamic_tool - Remove dynamic tools.

To enable dynamic tools:

export CODEN_RETRIEVER_ENABLE_DYNAMIC_TOOLS=1

Docker

Build

docker build -t coden-retriever:latest .

Usage

The coden-docker wrapper uses a persistent container:

cd /path/to/your/project
./coden-docker start .                  # Start container
./coden-docker .                        # Repository map
./coden-docker . --query "auth"         # Search
./coden-docker . --find "MyClass"       # Find symbol
./coden-docker -a                       # Agent mode
./coden-docker stop                     # Stop

First run builds the index. After that, the daemon keeps it in memory.

./coden-docker start [path]   # Start with workspace
./coden-docker stop           # Stop container
./coden-docker restart [path] # Restart with new workspace
./coden-docker status         # Container status

MCP Server in Docker

docker run -d -p 8000:8000 --name coden-mcp coden-retriever

Available at http://localhost:8000/mcp, health check at http://localhost:8000/health.

Docker Compose

docker compose up -d mcp-server
docker compose logs -f mcp-server
docker compose down

Docker Environment Variables

Variable Default What it does
CODEN_RETRIEVER_HOST 0.0.0.0 MCP server bind address
CODEN_RETRIEVER_PORT 8000 MCP server port
CODEN_RETRIEVER_DISABLED_TOOLS Tools to disable
CODEN_RETRIEVER_ENABLE_DYNAMIC_TOOLS Enable dynamic tools

Health check:

curl http://localhost:8000/health
# {"status":"healthy","service":"CodenRetriever"}

Agent Mode with Ollama in Docker

The container connects to host Ollama via host.docker.internal:

# On host
ollama serve

# In Docker
./coden-docker -a
# Then: /model ollama:qwen2.5-coder

Troubleshooting

If you encounter problems, clearing the cache and stopping the daemon might help:

coden cache clear --all
coden daemon stop

Full Reset

To reset everything at once, use the reset command:

coden reset

This performs all of the following in one step:

  • Clears all project caches
  • Stops the daemon
  • Resets configuration to defaults

Warning: This is a destructive operation. Your custom configuration settings will be lost and all cached indices will be deleted.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

coden_retriever-1.3.0.tar.gz (74.4 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

coden_retriever-1.3.0-py3-none-any.whl (74.5 MB view details)

Uploaded Python 3

File details

Details for the file coden_retriever-1.3.0.tar.gz.

File metadata

  • Download URL: coden_retriever-1.3.0.tar.gz
  • Upload date:
  • Size: 74.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.3

File hashes

Hashes for coden_retriever-1.3.0.tar.gz
Algorithm Hash digest
SHA256 14d7f8547db094c98c392b14cf81f28898dc1b940fd7fd1d70a11a32253fbda8
MD5 928ea074abfe31520db36e848082f579
BLAKE2b-256 9dc1418f34e994ecc90c829b1e71fb12071a7991d4108572515c9e6869331613

See more details on using hashes here.

File details

Details for the file coden_retriever-1.3.0-py3-none-any.whl.

File metadata

File hashes

Hashes for coden_retriever-1.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b7737add2f3b59223a3ae131f85bbb6732afe48fa082854a719492ad8e3e01b0
MD5 248268aae8e92e9d4cd5ff39c9cfb13c
BLAKE2b-256 313041d160c459babea44b09c51f7bff0ed05d6499b2a6157f1c03b32185e8de

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page